NewsSecurity

ThreatQuotient Achieves SOC 2 Type II Compliance for ThreatQ Platform

ThreatQuotient has announced that it has successfully completed a Service Organization Controls (SOC) 2 Type II compliance audit for its ThreatQ Platform. This certification validates that ThreatQuotient’s security and governance controls previously verified by Type I effectively maintain the security, confidentiality, and availability of their hosted service. The independent firm Clearview Group conducted the audit.

A key industry standard in data security, SOC 2 evaluates a technology service provider’s ability to securely manage customer data. To achieve a SOC 2 Type II designation, organizations undergo a rigorous audit that analyzes the following trust services criteria: security, availability, processing integrity, confidentiality, and privacy. ThreatQuotient’s continued adherence to its policies was tested and confirmed by the Type II audit process.

“It takes tremendous discipline and organization to provide on-demand evidence throughout an audit that a company is exercising their policies and procedures. ThreatQuotient is proud of this achievement, and considers SOC 2 Type II compliance just one of the many ways we intend to continue meeting and exceeding industry security standards,” said Tom Ashoff, Senior Vice President of Engineering, ThreatQuotient. “Achieving a favorable examination of ThreatQ provides our customers the confidence that we have the proper controls in place to protect their data, and assurance of the availability and confidentiality of their hosted service.”

As customer needs continue to evolve, ThreatQuotient is committed to providing innovative threat detection and response solutions. ThreatQuotient recently announced v5 of the ThreatQ platform, launching capabilities needed today to support the security operations center (SOC) of the future, where data is the foundation. ThreatQ connects the dots, bringing an organization’s wealth of data together into a common work surface, providing a data-driven security context that enables teams to be more thorough in their investigations, collaboration, response, and reporting.

Show More

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button